100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Information Security Exam 1 Spring 2024 – Panda Study Guide

Puntuación
-
Vendido
-
Páginas
6
Grado
A+
Subido en
21-11-2024
Escrito en
2024/2025

Information Security Exam 1 Spring 2024 – Panda Well Illustrated

Institución
INF4831 Information Security
Grado
INF4831 Information Security









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
INF4831 Information Security
Grado
INF4831 Information Security

Información del documento

Subido en
21 de noviembre de 2024
Número de páginas
6
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Information Security Exam 1 Spring 2024 –
Panda
Security involves protection from ___ and ___ - Read violations, write (modification)
violations

Security - Securing both the computer and the network

Insider Threat - Can happen when only focused on securing the network aspect and not
the computer aspect.
Threat comes from inside the organization (same network).
Both 1) causes more damage and 2) harder to detect than Outsider Threat due to
privileges/greater access to system.

Outsider Threat - Threat comes from outside the organization (different network).

Social Engineering - Tricking people into disclosing information instead of hacking
hardware

Social Engineering Methods - Showing superiority (me smart, you dumb) or inferiority
(help me plz idk anything).
Phishing (clik dis link).

WWW - World Wide Web.
Document management system of connected hyperlinks.

Internet - Connects computers.

Vulnerability - A weakness in the system that can be exploited by a threat.

Risk - Possibility of the assets suffering damage.
Risk requires all of the following to be present: Vulnerability, Asset, Threat.

Of Vulnerability, Threat, and Asset, which of them can be minimized most
effectively/commonly so that Risk may be reduced? - Vulnerability

CIA Paradigm - Confidentiality (Read protection from UNauthorized users)

Integrity (Write protection from UNauthorized users)

Availability (legit users must be able to use the data as needed without being overly
burdened by safety measures)
- E.g., a vault with no key to maximize security

, How to measure availability? - 1) System Uptime
2) System Downtime
3) % Uptime (Uptime divided by TotalTime)

4) Mean (average) time to repair
- Low value is good. E.g., 1hr to repair per month
5) Mean (average) time to failure
- High value is good. Time it takes from system starting to system failing

Security Paradigm - Protect (e.g., firewall)

Detect (e.g., antivirus scan, honeypots, log files)

Recover/React (e.g., use backups)
- Must be fast (bc availability) and correct (bc integrity)

A chain is as strong as ___ - Its weakest link

What are the seven IT domains? - 1) User
2) Workstation (something that a user can use to login)
3) LAN (Local Area Network)
4) LAN-to-WAN
5) WAN (Wide Area Network)
6) (Main) System/Application (e.g., Google app)
7) Remote Access

What is the most insecure part of a system? - Users (humans)

What two terms are used when developing and implementing a set of rules for an entire
IT system?
Security ___ and Security ___ - Security Policies, Security Mechanisms

Security Policies - Set of statements that can be implemented to enforce security.
What we want done.
E.g., Prevent harmful URLs from being accessed on the server.

Security Mechanisms - Define how policies can be implemented.
How we want security done.
E.g., Don't allow xyz.com to be accessed on the server.

Secure State - State in which a system cannot have any security violations

What are the three states of a system, in reference to the Secure State? - Broad: An
insecure system state may be reached
$9.45
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
spikerocky

Conoce al vendedor

Seller avatar
spikerocky Rhodes university
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
1 año
Número de seguidores
1
Documentos
29
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes